Marco Elver
unread,Jun 22, 2021, 5:01:33 AM6/22/21Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Sign in to report message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to yee...@mediatek.com, andre...@gmail.com, wsd_up...@mediatek.com, Andrey Ryabinin, Alexander Potapenko, Dmitry Vyukov, Andrew Morton, Matthias Brugger, open list:KASAN, open list:MEMORY MANAGEMENT, open list, moderated list:ARM/Mediatek SoC support, moderated list:ARM/Mediatek SoC support
The info about the percentage of how frequent this is could have been
provided as a simple reply to the discussion.
> This patch Add memzero_explict to initialize unaligned object.
This patch does not apply to anything (I see it depends on the previous patch).
What you need to do is modify the original patch, and then send a
[PATCH v2] (git helps with that by passing --reroll-count or -v) that
applies cleanly to your base kernel tree.
The commit message will usually end with '---' and then briefly denote
what changed since the last version.
https://www.kernel.org/doc/html/latest/process/submitting-patches.html#the-canonical-patch-format
> Based on the integrateion of initialization in kasan_unpoison(). The hwtag instructions, constrained with its granularity, has to overwrite the data btyes in unaligned objects. This would cause issue when it works with SLUB debug redzoning.
>
> In this patch, an additional initalizaing path is added for the unaligned objects. It contains memzero_explict() to clear out the data and disables its init flag for the following hwtag actions.
>
> In lab test, this path is executed about 1.1%(941/80854) within the overall kasan_unpoison during a non-debug booting process.
Nice, thanks for the data. If it is somehow doable, however, I'd still
recommend to additionally guard the new code path by a check if
debug-support was requested. Ideally with an IS_ENABLED() config check
so that if it's a production kernel the branch is simply optimized out
by the compiler.
> Lab test: QEMU5.2 (+mte) / linux kernel 5.13-rc7
>
> Signed-off-by: Yee Lee <
yee...@mediatek.com>
> ---
> mm/kasan/kasan.h | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h
> index d8faa64614b7..edc11bcc3ff3 100644
> --- a/mm/kasan/kasan.h
> +++ b/mm/kasan/kasan.h
> @@ -389,7 +389,7 @@ static inline void kasan_unpoison(const void *addr, size_t size, bool init)
> return;
> if (init && ((unsigned long)size & KASAN_GRANULE_MASK)) {
> init = false;
> - memset((void *)addr, 0, size);
> + memzero_explicit((void *)addr, size);
> }
> size = round_up(size, KASAN_GRANULE_SIZE);
> hw_set_mem_tag_range((void *)addr, size, tag, init);
> 2.18.0
>
> --
> You received this message because you are subscribed to the Google Groups "kasan-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to
kasan-dev+...@googlegroups.com.
> To view this discussion on the web visit
https://groups.google.com/d/msgid/kasan-dev/20210622084723.27637-1-yee.lee%40mediatek.com.